I would like to remove several of the Indicators that usually appear in the upper-right-hand side of the login screen. In particular, I would like to remove the accessibility, keyboard layout, power, and sound indicators, although it would be nice to know how to generically add or remove indicators. How can I do this?
fouric's questions
When I am using Wine or changing its preferences, I often get a pop-up that says, "The Wine configuration in /home/user/.wine is being updated, please wait..." It stays there for a minute or two, and then disappears and whatever I wanted to do happens. Internet searches for this dialog box have only pulled up bug reports, and never an explanation of what is going on.
What "configuration" is Wine updating, and why does it have to do it so often?
Every time I search for a term in less
, it stores my search in the file .lesshst
. How can I stop this behavior?
In my terminal prompt definition in my .bashrc
file, among other things, I have this snippet of code:
${debian_chroot:+($debian_chroot)}
What does this do, and do I need it?
I know that Bash has both HISTSIZE
and HISTFILESIZE
variables that control how long history is saved for, and how much of it is saved. I would like to keep an archive of my history. However, if I set either of the two variables mentioned above to a very large number, it makes searching for old commands very difficult, and after enough time they might get deleted anyway.
How can I automatically archive my bash history files once they get to a certain size, and is this method applicable to other log files (such as /var/log/auth.log
)?
A few weeks ago, my machine (lets call it "main") was logged into wirelessly from an unauthorized host, probably using ssh. I did not detect the intrusion until a few days ago, and my machine is completely shut down. I found the login using this line from last
:
myusername pts/1 ipad Tue Oct 15 22:23 - 22:25 (00:02)
Needless to say, not only does no one in my family own an iPad, but almost none of my friends do, either. This makes me suspect that whoever was behind this changed the hostname of their machine.
Additionally, I discovered this line in the last
output on another machine of mine ("secondary"):
myusername pts/2 :0 Tue Oct 15 22:23 - 22:23 (00:00)
This line coincides with the timestamp from main, which has password-less ssh access (through keys) to secondary. Is it possible that whoever broke in to main has also rooted secondary? How can I prevent this from happening again? Are there logs that I can look through to determine exactly how main was accessed (I am the only user on the system and have a very strong password)? Is it at all possible that this is just a weird bug that occurred? Should I, and where should I start looking for rootkits and/or keyloggers?
In short, what should I do?
In my /etc/ssh/
directory, I can see three that I have three different types of ssh keys:
-rw------- 1 root root 607 Oct 4 22:43 ssh_host_dsa_key
-rw-r--r-- 1 root root 623 Oct 4 22:43 ssh_host_dsa_key.pub
-rw------- 1 root root 241 Oct 4 22:43 ssh_host_ecdsa_key
-rw-r--r-- 1 root root 194 Oct 4 22:43 ssh_host_ecdsa_key.pub
-rw------- 1 root root 1602 Oct 4 22:43 ssh_host_rsa_key
-rw-r--r-- 1 root root 378 Oct 4 22:43 ssh_host_rsa_key.pub
What is are the differences between ssh's RSA, DSA, and ECDSA keys, and do I need all three?
I have multiple OpenPGP keys that I am managing with GPG. The problem is, they have the same user ID and the same e-mail address. How do I tell GPG the difference when I am, say, encrypting a file?
When I run apt-get
with an option that installs packages, such as apt-get install firefox
or apt-get dist-upgrade
, the last line of output that I see is usually ldconfig deferred processing now taking place
. What is going on here? What is ldconfig
, and what does it do?
I recently migrated from one installation of Ubuntu to another, and in the process changed my username. I imported my public/private key pair into gpg, and while decryption (using my private key) works fine, whenever I attempt to encrypt something to myself with my public key I get the following warning message:
It is NOT certain that the key belongs to the person named
in the user ID. If you *really* know what you are doing,
you may answer the next question with yes.
After that it asks me whether I really want to use the key (I always answer "yes", because it is in fact the only key in my keyring and I know where it came from). I can decrypt stuff just fine, so why does gpg throw a hissy fit whenever I try to encrypt something? And how can I prevent this message from appearing again?
In reading about Ubuntu Touch and Ubuntu for Android, I have noticed references to "bionic" and "libhybris" that are made fairly often.
I assume that libhybris is a library because of the "lib" prefix, but that's about all I know.
What are bionic and libhybris, and what do they do?
Edit: @maggotbrain asked if I could link to some of the sources where I found mention of bionic/libhybris. Here is a comment on Hacker News, and here is another. Those are the only ones that I could find, what really got me wondering was when someone mentioned it at an Ubuntu LoCo meeting.
How to share one PGP key on multiple machines details how to export your gpg secret key into a file with gpg --export-secret-key -a > secretkey.asc
. What the answer does not state is whether the keyfile created is encrypted with your pass-phrase or clear-text.
Is the key-file encrypted or not?
In my usage of Ubuntu, I have noticed a baffling array of different Linux kernel packages. Some of them are listed below:
linux-generic
linux-headers-generic
linux-headers-generic-pae
linux-headers-x.x.xx-xx
linux-headers-x.x.xx-xx-generic
linux-image-generic
linux-image-generic-pae
linux-image-x.x.xx-xx-generic
linux-image-x.x.xx-xx-generic-pae
linux-image-extra-x.x.xx-xx-generic
linux-image-extra-x.x.xx-xx-generic-pae
My question is, why are there so many different kernel packages, often for the same version number (e.g., 3.5.0-24), and what are the differences between them?
Edit to deduplicate: This question is not asking about the differences between generic, server, and virtual kernel packages; instead, it is asking about what all of those packages (as well as the ones in the list) are.
I have used Byobu for a bit and noticed something odd: I can split Byobu into tabs normally when I am using a terminal emulator, but when I am in a console or tty, pressing Shift+F2 only enters a tilde (~
) and Ctrl+F2 has no effect.
Is this a technical limitation? If so, how does it work?
How can I get started with debugging my wireless problem?
- How can I tell whether or not Linux has recognized my wireless hardware at all?
- What are the main programs/daemons associated with wireless connectivity?
- Where are the log files for those programs?
- Do those programs have debug modes that I can access?
- How can I tell whether a bug is in a userspace program or in a driver?
Edit: This was originally a more complex question with other inquiries about wireless driver hacking and debugging. I have removed those bullet points and plan to create another question to cover them, possibly on Unix & Linux SE.
How can I edit the contextual menu in Ubuntu? How can I add/remove items? Will the method for Ubuntu also work for variants such as Kubuntu/Xubuntu/Lubuntu? Is there a configuration file that I can edit, or do I have to use a program/utility instead?
Edit: Someone pointed out that every program handles its own contextual menu. In particular, I would like to be able to edit the contextual menus for Nautilus and the Unity desktop interface.
I am fond of using gcc to compile small little C and C++ programs on my main computer. However, I also have a Raspberry Pi, and, being a 700-MHz single-core computer, I would prefer to not have to do my development work on it every time I want to create a binary for it. How (for I know that there's a way) do I cross-compile my program for the Raspberry Pi using my x86 laptop? And is there a way that I may compile C(++) programs on the Pi but produce an x86 binary? If it's any help, "The SoC is a Broadcom BCM2835. This contains an ARM1176JZFS, with floating point..." (according to the official Raspberry Pi FAQ).
I have used e4rat
before to speed up Ubuntu. My understanding of it is that it moves files around on the disk to speed up boot times. However, I am also under the impression that ureadahead
fulfills the same purpose. Am I mistaken in their purposes, or are they redundant? And if so, which should I use? Finally, is ureadahead a standard GNU component, or is it Ubuntu-specific?
I would like to know what causes Ubuntu and/or Synaptic to recognize a program as being installed.
- Is there an equivalent of the Windows registry that an application has to have a entry in?
- Does a program have to be installed from a .*deb package to be classified as installed and show up in Synaptic?
- And where are files for an installed program usually kept? I know that configuration files are kept in
/home/x/
but not much else.
I would like to know how to install .deb packages without using a package manager such as dpkg. Is it possible to do this? What files do I have to edit? Or is there a unique procedure for each package?